[1]
J. Rachoń, Z. Piotrowski, and P. Gajewski, “Authentication in VoIP Telephony with Use of the Echo Hiding Method”, JTIT, vol. 43, no. 1, pp. 17–21, Mar. 2011, doi: 10.26636/jtit.2011.1.1127.